{"id":6356,"date":"2026-03-04T11:19:19","date_gmt":"2026-03-04T11:19:19","guid":{"rendered":"https:\/\/innovaway.it\/?p=6356"},"modified":"2026-03-04T14:04:06","modified_gmt":"2026-03-04T14:04:06","slug":"cybersecurity-limiti-e-futuro-dellattuale-crittografia","status":"publish","type":"post","link":"https:\/\/innovaway.it\/en\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/","title":{"rendered":"Cybersecurity: limits and future of current cryptography"},"content":{"rendered":"<p>The European regulatory ecosystem has undergone a radical transformation in recent years. GDPR, DORA, NIS2, and the AI Act do not merely represent an increase in compliance requirements, but rather define a new landscape in which the cryptographic protection of data is no longer an optional best practice, but a binding legal prerequisite.<\/p>\n<p>However, this evolution is increasingly making it clear that traditional cryptographic models, however sophisticated, present structural limitations that cannot be resolved through incremental optimizations, but instead require a deeper reassessment, also in light of the computational advancements on the horizon.<\/p>\n<h2>The operational paradox of validation<\/h2>\n<p>Traditional methodologies such as role-based access controls, encryption at rest and in transit, pseudonymization, database segregation, and audit trails encounter a fundamental problem: in order to validate personal data, it must be exposed in clear text.\nEvery KYC verification, every compliance check, and every onboarding process entails the exposure of data that, if compromised, generates liabilities extending beyond direct economic damage.<\/p>\n<p>This paradox has a dual impact. From an economic perspective, compliance management absorbs resources for technical implementation, continuous audits, legal consulting, and staff training. The risk of fines can reach up to 4% of global turnover, accompanied by reputational damage that is often more severe than the penalty itself.\nIBM\u2019s \u201cCost of a Data Breach 2024\u201d report highlights that the global average cost of a data breach has reached a historic record of $4.88 million, with a sharp increase in the healthcare and financial sectors, where the exposure of data in clear text represents one of the most costly risk vectors.<\/p>\n<p>The most critical limitation, however, lies elsewhere: these methodologies open the door to a concrete risk of system intrusion. Being compliant does not mean being secure; authorized personnel remain a potential attack vector, and every access constitutes a possible point of compromise.\nProcedural compliance, in other words, does not guarantee security.<\/p>\n<h2>Zero-Knowledge Proofs: verifying without reading<\/h2>\n<p>Zero-Knowledge Proof (ZKP) cryptographic protocols promise to eliminate this weakness by allowing a party to prove possession of a requirement without revealing the underlying data.\nTake the example of a financial institution that must verify that a client\u2019s income exceeds \u20ac30,000 in order to grant a loan. Traditionally, the client provides payslips and tax documents\u2014materials that disclose exact salary, employer, and financial details\u2014exposed to anyone who handles them.\nWith ZKPs, the employer digitally signs the client\u2019s income and, through an application, the client generates a cryptographic proof that the income exceeds \u20ac30,000 to present to the bank. In this way, no sensitive data is transmitted, no database acquires it, and no operator accesses it. The verification takes place, but the risk of compromise is eliminated at its root.<\/p>\n<p>Pilot projects in the banking sector show significant reductions in onboarding times and containment of compliance costs, thanks to the decreased need for personnel to handle sensitive data, lower secure storage expenses, and reduced insurance costs.\nHowever, the most relevant value lies in risk reduction: fewer sensitive data exposed in clear text means a smaller attack surface and lower liability in the event of an incident.<\/p>\n<p>Advances in the development of ZKPs are real and rapid: Microsoft, Google, and academic institutions are actively investing in these protocols, with a clear goal\u2014to transform them from an academic tool into a mainstream technology for sectors such as banking, public administration, and healthcare.<\/p>\n<h2>Vulnerability to quantum attacks<\/h2>\n<p>While attention focuses on immediate vulnerabilities, an additional threat is taking shape. Malicious actors are already applying the \u201charvest now, decrypt later\u201d tactic\u2014collecting encrypted data today with the intent to decrypt it once quantum computers reach the necessary capability. For infrastructures with 15\u201320 year lifecycles, such as 5G networks, or for data that retains value over time (healthcare, financial, governmental), this is far from a theoretical or negligible threat.<\/p>\n<p>The public-key cryptographic algorithms currently in use\u2014RSA, ECC, and their variants\u2014are vulnerable to quantum algorithms. The question is no longer if these systems will become obsolete, but when: the scientific community places the most likely horizon between 10 and 15 years. According to the World Economic Forum (WEF), over $20 trillion of global economic value within digital infrastructures is currently exposed to the risk of quantum decryption. For organizations handling data with multi-decade sensitivity, waiting for quantum computing to mature means being a vulnerable target today.<\/p>\n<p>For a medium-sized financial institution, the compromise of encrypted data translates into estimated exposures between \u20ac50 and \u20ac250 million. For critical sectors such as energy providers or telecom operators, it means putting core infrastructures worth tens of billions at risk. For companies whose capital largely consists of proprietary projects, research data, and mission-critical industrial designs (e.g., pharma, aerospace, defense), this exposure becomes not only economic but can also jeopardize the security of entire industrial sectors or even nations.<\/p>\n<h2>Post-quantum cryptography<\/h2>\n<p>In 2024, the U.S. National Institute of Standards and Technology (NIST) published the first post-quantum cryptography standards: no longer laboratory prototypes, but algorithms ready for implementation. Organizations no longer have the excuse of technology; this migration is already technically feasible, and the window to manage it in an orderly manner is shrinking month by month.<\/p>\n<p>This migration requires a complete inventory of where cryptography is used, which algorithms are in place, what dependencies exist, and a risk assessment specific to each asset: which data has long-term value, which systems have extended lifecycles, and which compromises would have critical impact. These steps are essential, especially since organizations very rarely have visibility in this area. Market research on \u201cCrypto Agility\u201d confirms this gap: fewer than 25% of large companies maintain a list\u2014and therefore a clear view\u2014of their cryptographic assets.<\/p>\n<p>In this context, a last-minute or emergency migration\u2014planned only when it becomes inevitable\u2014is a risky option, with high costs and a significant margin for error.<\/p>\n<p>&nbsp;<\/p>\n<p><i>By Sergio Ajani, Services &amp; Solutions Design Director at Innovaway<\/i><\/p>","protected":false},"excerpt":{"rendered":"<p>L\u2019ecosistema normativo europeo ha subito una trasformazione radicale negli ultimi [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":6361,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[33,34],"tags":[],"class_list":["post-6356","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-digital-transformation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity: limiti e futuro dell\u2019attuale crittografia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/innovaway.it\/en\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: limiti e futuro dell\u2019attuale crittografia\" \/>\n<meta property=\"og:description\" content=\"L\u2019ecosistema normativo europeo ha subito una trasformazione radicale negli ultimi [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/innovaway.it\/en\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovaway\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-04T11:19:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-04T14:04:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/innovaway.it\/wp-content\/uploads\/2026\/03\/WhatsApp-Image-2026-03-04-at-14.14.56.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ADM-Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ADM-Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/\"},\"author\":{\"name\":\"ADM-Marketing\",\"@id\":\"https:\\\/\\\/innovaway.it\\\/#\\\/schema\\\/person\\\/25c4ea055c0ce858e1e7f85f6daf7ebe\"},\"headline\":\"Cybersecurity: limiti e futuro dell\u2019attuale crittografia\",\"datePublished\":\"2026-03-04T11:19:19+00:00\",\"dateModified\":\"2026-03-04T14:04:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/\"},\"wordCount\":1000,\"image\":{\"@id\":\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/innovaway.it\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/WhatsApp-Image-2026-03-04-at-14.14.56.jpeg\",\"articleSection\":[\"Cybersecurity\",\"Digital Transformation\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/\",\"url\":\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/\",\"name\":\"Cybersecurity: limiti e futuro dell\u2019attuale crittografia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/innovaway.it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/innovaway.it\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/WhatsApp-Image-2026-03-04-at-14.14.56.jpeg\",\"datePublished\":\"2026-03-04T11:19:19+00:00\",\"dateModified\":\"2026-03-04T14:04:06+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/innovaway.it\\\/#\\\/schema\\\/person\\\/25c4ea055c0ce858e1e7f85f6daf7ebe\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/innovaway.it\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/WhatsApp-Image-2026-03-04-at-14.14.56.jpeg\",\"contentUrl\":\"https:\\\/\\\/innovaway.it\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/WhatsApp-Image-2026-03-04-at-14.14.56.jpeg\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/innovaway.it\\\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\\\/digital-transformation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/innovaway.it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: limiti e futuro dell\u2019attuale crittografia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/innovaway.it\\\/#website\",\"url\":\"https:\\\/\\\/innovaway.it\\\/\",\"name\":\"Innovaway\",\"description\":\"Always By Your Side per supportare la tua trasformazione digitale\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/innovaway.it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/innovaway.it\\\/#\\\/schema\\\/person\\\/25c4ea055c0ce858e1e7f85f6daf7ebe\",\"name\":\"ADM-Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7aaf7813b957aaf2ef787172ced76673e4fc710d589c4e1f1c6b0fcb0755f021?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7aaf7813b957aaf2ef787172ced76673e4fc710d589c4e1f1c6b0fcb0755f021?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7aaf7813b957aaf2ef787172ced76673e4fc710d589c4e1f1c6b0fcb0755f021?s=96&d=mm&r=g\",\"caption\":\"ADM-Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity: limits and future of current cryptography","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/innovaway.it\/en\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity: limiti e futuro dell\u2019attuale crittografia","og_description":"L\u2019ecosistema normativo europeo ha subito una trasformazione radicale negli ultimi [&hellip;]","og_url":"https:\/\/innovaway.it\/en\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/","og_site_name":"Innovaway","article_published_time":"2026-03-04T11:19:19+00:00","article_modified_time":"2026-03-04T14:04:06+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/innovaway.it\/wp-content\/uploads\/2026\/03\/WhatsApp-Image-2026-03-04-at-14.14.56.jpeg","type":"image\/jpeg"}],"author":"ADM-Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ADM-Marketing","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/#article","isPartOf":{"@id":"https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/"},"author":{"name":"ADM-Marketing","@id":"https:\/\/innovaway.it\/#\/schema\/person\/25c4ea055c0ce858e1e7f85f6daf7ebe"},"headline":"Cybersecurity: limiti e futuro dell\u2019attuale crittografia","datePublished":"2026-03-04T11:19:19+00:00","dateModified":"2026-03-04T14:04:06+00:00","mainEntityOfPage":{"@id":"https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/"},"wordCount":1000,"image":{"@id":"https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/#primaryimage"},"thumbnailUrl":"https:\/\/innovaway.it\/wp-content\/uploads\/2026\/03\/WhatsApp-Image-2026-03-04-at-14.14.56.jpeg","articleSection":["Cybersecurity","Digital Transformation"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/","url":"https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/","name":"Cybersecurity: limits and future of current cryptography","isPartOf":{"@id":"https:\/\/innovaway.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/#primaryimage"},"image":{"@id":"https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/#primaryimage"},"thumbnailUrl":"https:\/\/innovaway.it\/wp-content\/uploads\/2026\/03\/WhatsApp-Image-2026-03-04-at-14.14.56.jpeg","datePublished":"2026-03-04T11:19:19+00:00","dateModified":"2026-03-04T14:04:06+00:00","author":{"@id":"https:\/\/innovaway.it\/#\/schema\/person\/25c4ea055c0ce858e1e7f85f6daf7ebe"},"breadcrumb":{"@id":"https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/#primaryimage","url":"https:\/\/innovaway.it\/wp-content\/uploads\/2026\/03\/WhatsApp-Image-2026-03-04-at-14.14.56.jpeg","contentUrl":"https:\/\/innovaway.it\/wp-content\/uploads\/2026\/03\/WhatsApp-Image-2026-03-04-at-14.14.56.jpeg","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/innovaway.it\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\/digital-transformation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/innovaway.it\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity: limiti e futuro dell\u2019attuale crittografia"}]},{"@type":"WebSite","@id":"https:\/\/innovaway.it\/#website","url":"https:\/\/innovaway.it\/","name":"Innovaway","description":"Always By Your Side to Support Your Digital Transformation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/innovaway.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/innovaway.it\/#\/schema\/person\/25c4ea055c0ce858e1e7f85f6daf7ebe","name":"ADM-Marketing","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/7aaf7813b957aaf2ef787172ced76673e4fc710d589c4e1f1c6b0fcb0755f021?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7aaf7813b957aaf2ef787172ced76673e4fc710d589c4e1f1c6b0fcb0755f021?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7aaf7813b957aaf2ef787172ced76673e4fc710d589c4e1f1c6b0fcb0755f021?s=96&d=mm&r=g","caption":"ADM-Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/innovaway.it\/en\/wp-json\/wp\/v2\/posts\/6356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/innovaway.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/innovaway.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/innovaway.it\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/innovaway.it\/en\/wp-json\/wp\/v2\/comments?post=6356"}],"version-history":[{"count":1,"href":"https:\/\/innovaway.it\/en\/wp-json\/wp\/v2\/posts\/6356\/revisions"}],"predecessor-version":[{"id":6358,"href":"https:\/\/innovaway.it\/en\/wp-json\/wp\/v2\/posts\/6356\/revisions\/6358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/innovaway.it\/en\/wp-json\/wp\/v2\/media\/6361"}],"wp:attachment":[{"href":"https:\/\/innovaway.it\/en\/wp-json\/wp\/v2\/media?parent=6356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/innovaway.it\/en\/wp-json\/wp\/v2\/categories?post=6356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/innovaway.it\/en\/wp-json\/wp\/v2\/tags?post=6356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}